- A308, Portland Square, Drake Circus, Plymouth, PL4 8AA
- +44 1752 586218
- N.Clarke@plymouth.ac.uk
Profiles
Professor Nathan Clarke
Professor in Cyber Security and Digital Forensics
School of Engineering, Computing and Mathematics (Faculty of Science and Engineering)
Professor Nathan Clarke can be contacted through arrangement with our Press Office, to speak to the media on these areas of expertise.
- Information security
- Biometrics
- Computer forensics
- Computing
Email publicrelations@plymouth.ac.uk to enquire.
Biography
Biography
Nathan Clarke is a Professor of Cyber Security and Digital Forensics at the University of Plymouth. He is also an adjunct Professor at Edith Cowan University, Western Australia. His research interests reside in the area of information security, biometrics, forensics and intrusion detection and has over 250 journal papers, conference papers, books, edited books, book chapters and patents.
He is the past Chair of the IFIP TC11.12 Working Group on the Human Aspects of Information Security & Assurance (2013-2019) and is the co-chair of the long standardising HAISA series of symposiums. Prof Clarke is a chartered engineer, a fellow of the British Computing Society (BCS), a fellow of the Chartered Institute of Information Security, a senior member of the IEEE.
Qualifications
- PGCert Learning & Teaching in Higher Education (2005)
- PhD, "Advanced User Authentication for Mobile Devices" (2004)
- BEng (Hons) Electronic Engineering (1st Class) (2001)
- EC Council Certified Ethical Hacker (CEH)
- EC Council Certified Hacking Forensic Investigator (CHFI)
- AccessData Certified Examiner (ACE)
Professional membership
- Fellow of the Chartered Institute of Information Security (FCIIS)
- Fellow of the British Computing Society (FBCS)
- Senior Fellow of the Higher Education Academy (SFHEA)
- Senior Member of the Institute for Electrical and Electronic Engineering (SMIEEE)
- Chartered Engineer (CEng)
Roles on external bodies
- Professional Member representative on BCS Council (2022-2025)
- Chair, IFIP TC11 Working Group 11.12 Human Aspects of Information Security & Assurance (2013-2019)
- Member, IFIP TC11 Working Group 11.12 on Human Aspects of Information Security & Assurance (2010-)
- Member, IFIP TC11 Working Group 11.1 on Information Security Management
- Member, IFIP TC11 Working Group 11.6 on Identity Management
External Research Council Grant Reviewing:
- Engineering and Physical Sciences Research Council (EPSRC), UK
- National Research Foundation (NRF), South Africa
- National Research Council Canada (NRC), Canada
- Portuguese Foundation for Science and Technology (FCT), Portugal
- Technology Foundation STW, The Netherlands
- Flanders Innovation & Entrepreneurship, Belgium
- The Royal Society, United Kingdom
- European Research Council
- Swiss National Science Foundation
- Research and Innovation Foundation of Cyprus
Key publications
(2021) 'Frictionless User Authentication' in Jajodia S; Samarati P; Yung M Encyclopedia of Cryptography, Security and Privacy Springer , DOI
(2022) 'Addressing big data variety using an automated approach for data characterization' Journal Of Big Data 9, (1) , DOI Open access
(2020) 'Incorporating the Human Facet of Security in Developing Systems and
Services' Information and Computer Security , DOI Open access
(2019) 'A Novel Transparent User Authentication Approach for Mobile Applications' Information Security Journal: A Global Perspective 27, (5-6) 292-305 , DOI Open access
(2017) 'A novel privacy preserving user identification approach for network traffic' Computers and Security , DOI Open access
Teaching
Teaching
Teaching interests
Module Delivery
- COMP3011 Ethical Hacking*
- COMP3012 Digital Forensics & Malware Analysis*
- COMP5003 Ethical Hacking*
- COMP5004 Digital Forensics & Malware Analysis*
- PUSL3132 Ethical Hacking
Previous Module Delivery:
- CNET115 Computer & Information Security*
- CNET117 Digital Forensics*
- CNET335/522 Cybercrime & Forensic Investigation*
- SOFT230 Remote Data Access Technology
- CNET221 Network Security
- CNET232/525 Systems Security*
- COMP212 Software Engineering and High Level Programming
- COMP223 High Level Programming
- CNET338/538 Security for Mobile Systems*
- CNET336/532 Cryptography & Applications*
- CNET520 Applications of Security
- CNET531 Intrusion Prevention, Detection & Response*
- SEC101 Introduction to Computer Security*
- SEC102PP Cybersecurity Essentials*
- SEC201 Digital Forensic Investigation*
- SEC104 Cybersecurity & Networks*
- SEC305/505 Digital Forensic Investigation*
- COMP1002 Cyber Security & Networks*
*Developed module
Staff serving as external examiners
External Teaching Roles:
- External Examiner, Computer Science/Cyber Security, University of the West of England (2022-2026)
- External Examiner, BSc (Hons) Cyber Security, Aston University (2021-2025)
- External Advisor for BSc Computer Science, National Commission for Further and Higher Education, Malta (June 2021)
- External Advisor for MSc in Artificial Intelligence, National Commission for Further and Higher Education, Malta (March 2020)
- External Examiner for Undergraduate Programmes in Cyber Security, Edinburgh Napier University (2016-2021)
- External Examiner for MSc in Cyber Security and Forensics, University of Westminster (2015-2019)
- External Advisor for Programme Approval of Comp Computer Forensics, Computer Security & Computer Networks, Liverpool John Moores University (December 2015)
- External Examiner for MSc in Cybersecurity and Management, University of Warwick (2012 – 2017)
- Programme Approval of MComp/BSc (Hons) Computer Security with Forensics, Sheffield Hallam University (April 2011)
- Programme Approval of BSc (Hons) Computer Forensics, Liverpool John Moores University (Beckett College) (March 2011)
- Programme Approval of MSc Computer Systems and MSc Computer Applications, University of Bedfordshire (June 2010)
- Programme Approval of MSc Web Technologies, MSc Media Technology Management and MSc Sound Engineering, Birmingham City University (May 2010)
- External Examiner for MSc Computer Applications in Accounting and MSc Computer Systems Auditing, London Metropolitan University (2009 - 2013)
- Programme Approval of BSc (Hons) Mobile Communications Technology, University of Central England (March 2007)
- External Examiner for MSc Computer Forensics & Security, University of Bedfordshire, UK (2007-2010)
- Programme Approval of BSc (Hons) Computing & Information Security, Sheffield Halam University (March 2008)
Research Degree Examiner:
- 2024, PhD, Detecting the Command and Control Communication of Banking Malware using Artificial Intelligence, University of Greenwich
- 2024, PhD, An Exploration of Information Security Practices within UK Primary, Secondary and Further Education Institutions, University of Portsmouth
- 2023, PhD, Development of Big Data Anonymization Framework using DNA Computing, Visvesvaraya Technological University
- 2023, PhD, The Social, Legal and Technical Perspective of Cyberstalking in India, University of Bedfordshire
- 2023, PhD, The Advanced Framework for Evaluating Remote Agents: A Framework for Digital Forensic Practitioners, Curtin University
- 2023, PhD, Labrandor – A framework for guiding the development of dynamically generated penetration testing laboratories, Flinders University, Australia
- 2023, PhD, Configuration Management of Distributed Systems over Unreliable and Hostile Networks, University of Westminster, UK
- 2023, PhD, Adaptive Cybersecurity Training Framework for Social Media Risks, University of Plymouth (Internal)
- 2023, PhD, Wearable In-Ear Electroencephalography based System for Biometric Authentication, City University
- 2022, PhD, Identifying Ransomware through Statistical and Behavioural Analysis, University of Kent
- 2022, PhD, Secure PIN-Entry Method Resistant to Shoulder-Surfing and Recording Attacks, Universiti Malaya, Malaysia
- 2022, DPhil Thesis, An Information Privacy-Compliance Model based upon Configurable Software Objects, Nelson Mandela University, South Africa
- 2022, PhD, Optimising Flow Routing using Network Performance Analysis, University of Plymouth (Internal)
- 2021, PhD Thesis, Granular Multi-Label Network Traffic Classification using Incremental Learning and Classifer Chains, Universiti Malaya, Malaysia
- 2021, PhD Thesis, Information Assurance in Saudi Healthcare Entities, University of Southampton
- 2021, PhD Thesis, A Framework for Understanding and Establishing an Effective Information Security Culture, University of Plymouth (Internal)
- 2021, PhD Thesis, Tracing Learning Environment in Java Programming Language, University of Plymouth (Internal)
- 2020, Professional Doctorate, The Professional Identity of Security Risk Intelligence Analysts in the Private Sector: An International Perspective, University of Portsmouth
- 2020. PhD Thesis, Building Cyber Defense Training Capacity, University of Plymouth (Internal)
- 2020, PhD Thesis. Continuous Authentication on Mobile Devices, City University of London
- 2020, PhD Thesis, Risk Communication Framework for Parental Control in the Digital World, University of Plymouth (Internal)
- 2019, PhD Thesis, Strengthening Password-Based Authentication, Royal Holloway, University of London, UK
- 2019, PhD Thesis, Relevance Feedback Optimization for Digital Forensic Investigations, The British University in Dubai, UAE
- 2019, PhD Thesis, Advancing User Authentication and Access Management, University of Plymouth, UK (Internal)
- 2019, PhD Thesis, Towards a Standardized Attack Graph Visual Syntax, The University of Warwick, UK
- 2019, PhD Thesis, An Evaluation and Enhancement of Public Cyber Security Awareness, University of Plymouth, UK (Internal)
- 2019, PhD Thesis, Honeypot for Wireless Sensor Networks, University of Plymouth, UK (Internal)
- 2019, PhD Thesis, Social Engineering Attack Detection Model, University of Pretoria, South Africa
- 2018, PhD Thesis, System Steganalysis: Implementation Vulnerabilities and Side Channel Attacks against Digital Steganography Systems, University of Kent, UK
- 2018, PhD Thesis, An Investigation Framework for the IoT Forensics, University of Southampton, UK
- 2018, PhD Thesis, Towards a framework to promote the development of secure and usable online information security applications, University of South Africa, South Africa
- 2018, PhD Thesis, A Multi-Domain Approach for Insider Threat Modelling and Security Compliance, University of Bristol, UK
- 2017, PhD Thesis, Big Data Forensic as a Service, University of South Wales
- 2017, PhD Thesis, A Novel Human Visual Psychophysics Based Approach to Distinguish Between Human Users and Computer Robots, City University
- 2017, PhD Thesis, A Method to Enhance the Accuracy of Digital Forensics in the Absence of Complete Evidence in Saudi Arabia, De Montfort University
- 2017, PhD Thesis, A Malware Analysis and Detection System for Mobile Devices, University of Malaya
- 2016, PhD Thesis, A Generic Smartphone Forensic Investigation Process Model, University Putra Malaysia
- 2016, PhD Thesis, The Role of Security and its Antecedents in E-Government Adoption, Plymouth University (Internal)
- 2016, PhD Thesis, Defending Against Network and Application Level Denial of Service Attacks, Indian Institute of Technology, Patna, India
- 2016, PhD Thesis, Opportunities & Risks in Online Gaming Environments, Plymouth University (Internal)
- 2015, PhD Thesis, Techniques for Analysis & Detection of Android Malware, Malaviya National Institute of Technology, India.
- 2015, PhD Thesis, Asymmetric Encryption for Wiretap Channels, Plymouth University (Internal)
- 2015, PhD Thesis, Identifying Memory Address Disclosures, De Montfort University, UK
- 2015, PhD Thesis, Resolving Semantic Disparities in Digital Forensics, University of Pretoria, South Africa
- 2015, PhD Thesis, User Controlled Identity Management Systems using Mobile Devices, Glasgow University, UK
- 2015, PhD Thesis, Secure BPMN – A Graphical Extension for BPMN 2.0 Based pm a Reference Model of Information Assurance and Security, Cardiff University, UK
- 2015, PhD Thesis, Improved Composability of Software Components through Parallel Hardware Platforms for In-Car Multimedia Systems, University of Plymouth (Internal)
- 2015, PhD Thesis, A Near-Miss Analysis Model for Improving the Forensic Investigation of Software Failures, University of Pretoria, South Africa
- 2015, MTech Thesis, Guidelines to Address the Human Factor in the South African National Research and Education Network Beneficiary Institutions.
- 2015, PhD Thesis, Establishing an Information Security Awareness and Culture, Plymouth University (Internal)
- 2014, PhD Thesis, Context-Aware Attribute-Based Techniques for Data Security and Access Control in Mobile Cloud Environment, City University, UK
- 2014, DPhil Thesis, A Public Safety, Participatory Crowdsourcing Smart City Model for a Developing Country, University of Fort Hare, South Africa
- 2014, PhD Thesis, The Practical Implementation of Optimal and Pseudo-Optimal Routing Algorithms, Glyndwr University, United Kingdom
- 2014, PhD Thesis, Anonymous Authenticated Announcement Schemes in Vehicular Ad Hoc Networks, Royal Holloway, University of London
- 2014, PhD Thesis, Method for the Adoption of Information Technology Governance, Risk Management and Compliance in Swiss Hospitals, Plymouth University (Internal)
- 2013, MSc Thesis, Forensic Evidence Isolation in Clouds, University of Pretoria, South Africa
- 2013, PhD Thesis, Digital Forensics: An Integrated Approach for the Investigation of Cyber/Computer Related Crimes, University of Bedfordshire
- 2013 Service Quality and Profit Control in Utility Computing Service Life Cycles, PhD Thesis, Plymouth University (Internal Examiner)
- 2012 The Advanced Data Acquisition Model (ADAM): A Process Model for Digital Forensic Practice, PhD Thesis, Murdoch University, Australia
- 2012 Security Usability in IT Systems, MPhil Thesis, Plymouth University (Internal Examiner)
- 2011 Behavioural Profiling in Mobile Neworks, PhD Thesis, University of Plymouth (Internal Examiner), UK
- 2010 An Investigation into Remote Transactions, PhD Thesis, Edith Cowan University, Australia
- 2010 Intrusion Detection Method using a Combination of Neural Network Algorithms, MPhil Thesis, Wessex Institute of Technology, University of Wales, UK
- 2010 Parameter Based Identification, Authentication and Authorisation Method for Mobile Devices, PhD Thesis, City University, London, UK
- 2010 An Automatic Bank System for Client Credit Rating, MPhil Thesis, Wessex Institute of Technology, University of Wales, UK
- 2009 Smartcard Architecture for Dynamic and Secure Authentication, MSc, University of Pretoria, South Africa
- 2008 Models and Methods of Information Security Risks Assessment in the Circumstances of Input Information Ambiguity, MPhil Thesis, Wessex Institute of Technology, University of Wales, UK
- 2008 Adoption of Criminal Profiling to Combat Hacking, MPhil Thesis, University of Plymouth, UK - Internal Examiner
- 2007 Establishing Information Security Culture in Australian Small and Medium Enterprises, PhD Thesis, Deakin University, Australia
- 2007 A Key Management Framework for Secure Group Communication in Wireless Mobile Environments, PhD Thesis, Royal Holloway, University of London, UK
- 2006 The Effectiveness of Graphical Authentication: An Exploratory Study, PhD Thesis, Deakin University, Australia
- 2006 Ontology Modelling for the Information Sharing Process within the Labour Market, MPhil Thesis, Wessex Institute of Technology, UK
- 2006 Corporate Information Risk: An Information Security Governance Framework, MTech Dissertation, Nelson Mandela Metropolitan University, South Africa.
Research
Research
Research interests
- Artificial Intelligence & Cyber Security
- Biometric Authentication
- Digital Forensics
- Cyber security
- Information Systems Security
- Intrusion Detection Systems
- Security Management and Risk Assessment
- Security Education and Awareness
Research groups
Research degrees awarded to supervised students
Completed PhD Project Supervision as Director of Studies:
- Dr Fudong Li, Intrusion Prevention and Detection for Mobile Systems (2012)
- Dr Shuhaili Talib, Personalising Information Security Education (2013)
- Dr Hataichanok Saevanee, Enhancing Authentication over a Touch Screen Interface (2014)
- Dr Sevasti Karatzouni, Non-Intrusive Continuous User Authentication for Mobile Devices (2014)
- Dr Mahmood Al Fahdi, Automated Digital Forensics & Cybercrime Profiling (2016)
- Dr Christopher Kosmas, Secure tracking system for next generation CIT products (2014)
- Dr Salam Ketab, E-Invigilator of E-Assessment (2017)
- Dr Saad Alqahtany, A Forensically-Enabled Cloud Computing Architecture (2017)
- Dr Gaseb Alotibi, Behavioural Monitoring for Network Communications (2017)
- Dr Abdulwahid Al Abdulwahid, Federated Authentication using the Cloud (Cloud Aura) (2017)
- Dr Athanassios Triantafyllidis, eLearning Web-Based Applications: Enhancing Productivity and Commercial Value (2017)
- Dr Burhan Al-Bayati, Continuous Identity Verification in Cloud Computing Services (2018)
- Dr Hussam Mohammed, Digital Forensic Analysis of Big Data (2018)
- Dr Manal Alohali, Information Security Risk Assessment for The General Public (2018)
- Dr Leith Abed, Securing Cloud Storage by Transparent Biometric Cryptography (2019)
- Dr Hiba Al-Kawaz, Forensic Facial Recognition of Multimedia Files (2019)
- Dr Hind Al-Obaidi, Transparent Authentication Utilising Gait Recognition (2019)
- Dr Timibloudi Stephen Enamamu, Bioelectrical User Authentication (2019)
- Dr Shahlaa Mashhadani, Image Forensics (2019)
- Dr Abdulrahman Alruban, Applying biometrics to digital forensics (2020)
- Dr Dany Joy, An Intelligent Network Forensic Analyzer (2020)
- Dr Fayez Alotaibi, Improving Cyber Security Management and Awareness for Home Users (2020)
- Dr Aziz Alshehri, A Privacy Enhancing Framework for Mobile Devices (2020)
- Dr Abdulaziz Altamimi, Author Identification of Text Limited Messages (2020)
- Dr Neamah Al-Naffakh, Wearable Computing and Transparent Authentication (2020)
- Dr Georgios Vranopoulos, Tackling Big Data Variety using Metadata (2022)
Completed PhD Project Supervision as Supervisor:
- Dr Shukor Razak, A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks (2007)
- Dr Vassilis Dimopoulos, Effective Information Assurance with Risk Management (2007)
- Dr Gina C Tjhai, Anomaly-Based Correlation of IDS Alarms (2011)
- Dr Tarik Ibrahim, Improving Intrusion Prevention, Detection and Response (2011)
- Dr Nor Badrul Anuar Jumaat, Incident Prioritisation for Intrusion Response Systems (2012)
- Dr Garrett Smiley, Investigating the Role of Multibiometric Authentication on Professional Certification E-Examination (2013)
- Dr Witold Thaul, The support of learning processes via personal knowledge management Education (2013)
- Dr Frank Doelitzscher, Security and Privacy for Cloud Computing (2014)
- Dr Chris Hocking, Authentication Aura (2015)
- Dr Hanna Shauchenka, Marketing of virtual Universities (Atlantis University) – Application of Quantitative Analysis (2015)
- Dr Thomas Rübsamen, Privacy Protection in Cloud Computing (2016)
- Dr Mutlaq Alotaibi, User's behaviour with Organisational Information Security Policies (2017)
- Dr Saud Nejr Alotaibi, Taxonomy of Application-Based Behaviour Authentication for Mobile Security (2019)
- Dr Reem Alkanhel, Designing a usable security framework for IoT (2019)
- Dr Samah Alshathri, Energy Consumption Optimisation in Cloud Computing Data Centres (2020)
- Dr Stefan Frey, Autonomic SLA Management as a Service (2020)
- Dr Faisal Shaman, User Traffic Profiling in Computer Networks (2020)
- Dr Hendrik Kuijs, A Platform as a Service Framework for Ambient Assisted Living Services (2023)
- Dr Thomas Rieger, Making and Success Factors for the Use of Big Data & Analytics Methods and Technologies (2023)
- Dr Holger Gantikow, Secure High Performance Computing provided as PaaS (2023)
Grants & contracts
- European Research Development Fund. EPIC 2. 2020-2023. €3.3M (Total Award: €4.1M)
- Research England Development Fund. Cyber-Ship Lab. 2019-2022: £1.682 M (Total Award: £3M)
- EU Horizon 2020. Foresight. 2019-2022: €290,000 (Total Award: €6M)
- EU Horizon 2020. Cyber-Trust. 2017-2020: €398,000 (Total Award: €3M)
- Knowledge Transfer Partnership. Essential 6 Ltd. 2015: £124,000
- Security Consultancy. Kernow Health Solutions. 2014: £5000
- EPSRC. Identifying and Responding to Human and Software Behaviours in a Changing Cyber Threat Landscape. 2013: £173,383 (Total Award: £1.0M)
- Teaching Fellowship Award – e-Invigilator. Plymouth University. 2012: £8100
- EU Framework 7 Grant. Centre of Excellence in Cybercrime and Forensics: 2012: £7800 (Total Award: £800k)
- EU Framework 7 Grant. Geryon. 2011: €478K (Total Award: €2.5M)
- EU Framework 7 Grant. Space Data Routers. 2010: £220,000 (Total Award: £1.6)
- Knowledge Transfer Partnership. Absolute Software Limited. 2010: £183,094
- Knowledge Transfer Partnership. K2 Medical Systems. 2008: £115,804.
- Teaching Fellowship Award – Peer Assessment. University of Plymouth. 2008: £4900
- Knowledge Transfer Partnership. Spinnaker International. 2008: £141,599
- Knowledge Transfer Partnership. Westland Geoprojects Limited. 2008: £109,633
- DTI Funded project into Behavioural Monitoring of Network Communications. 2007: £40,000
- End Point Compliance. Symantec.2007: £7,000
- Flexible and non-intrusive user authentication for mobile devices. EduServ Foundation. 2006: £80,390
- Knowledge Transfer Partnership. Parker Hannifin 2005: £174,000
- Subscriber Authentication via Keystroke Analysis on a mobile handset. Orange Personal Communication Services Limited. 2004. £19,814
- Biometric Terminal, Phase 1. Orange Personal Communication Services Limited. 2003: £55,000
- PC Integrity Testing. Plymouth Trading Standards. 2003-2004: £1,250
- WinCPR Software Development. SAHFOS. 2002: £4,000
Publications
Publications
Key publications
(2021) 'Frictionless User Authentication' in Jajodia S; Samarati P; Yung M Encyclopedia of Cryptography, Security and Privacy Springer , DOI
(2022) 'Addressing big data variety using an automated approach for data characterization' Journal Of Big Data 9, (1) , DOI Open access
(2020) 'Incorporating the Human Facet of Security in Developing Systems and
Services' Information and Computer Security , DOI Open access
(2019) 'A Novel Transparent User Authentication Approach for Mobile Applications' Information Security Journal: A Global Perspective 27, (5-6) 292-305 , DOI Open access
(2017) 'A novel privacy preserving user identification approach for network traffic' Computers and Security , DOI Open access
Key publications are highlighted
Journals
Articles
(2023) 'Big Data Confidentiality: An Approach Toward Corporate Compliance Using a Rule-Based System' Big Data , DOI Open access
(2023) 'Editorial: Human aspects of cyber security' Information & Computer Security 31, (3) 265-266 , DOI
(2022) 'Addressing big data variety using an automated approach for data characterization' Journal Of Big Data 9, (1) , DOI Open access
(2020) 'Incorporating the Human Facet of Security in Developing Systems and
Services' Information and Computer Security , DOI Open access
(2020) 'A novel approach for improving information security management and awareness for home environments' Information and Computer Security , DOI Open access
(2019) 'Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements' Information & Computer Security 28, (3) 399-422 , DOI
(2019) 'End-to-middle-to-end solution for IMS media plane
security' Electronic Commerce Research 19, (3) 719-746 , DOI Open access
(2019) 'A proactive malicious software identification approach for digital forensic examiners' Journal of Information Security and Applications , DOI Open access
(2019) 'A Novel Transparent User Authentication Approach for Mobile Applications' Information Security Journal: A Global Perspective 27, (5-6) 292-305 , DOI Open access
(2019) 'A Framework for Reporting and Dealing with End-User Security Policy Compliance' Information and Computer Security 27, (1) 2-25 , DOI Open access
(2018) 'Sharing with live migration energy optimization scheduler for cloud computing data centers' Future Internet 10, (9) , DOI Open access
(2018) 'Identifying and Predicting the Factors Affecting End-Users’ Risk-Taking Behavior' Information and Computer Security 26, (3) 306-326 , DOI Open access
(2018) 'The Design of a Multimedia-Forensic Analysis Tool (M-FAT)' International Journal of Multimedia and Image Processing 8, (1) 398-408 , DOI Open access
(2018) 'The Design and Evaluation of a User-Centric Information Security Risk Assessment and Response Framework' International Journal of Advanced Computer Science and Applications 9, (10) , DOI Open access
(2017) 'A novel privacy preserving user identification approach for network traffic' Computers and Security , DOI Open access
(2017) 'A Robust e-Invigilation System Employing Multimodal Biometric Authentication' International Journal of Information and Education Technology 7, (11) 796-802 , DOI Open access
(2016) 'Identifying Users by Network Traffic Metadata' International Journal of Chaotic Computing 4, (2) 103-112 , DOI Open access
(2016) 'Leveraging Biometrics for Insider Misuse Identification' International Journal on Cyber Situational Awareness 1, (1) 130-151 , DOI Open access
(2016) 'A Comprehensive Evaluation of Feature Selection for Gait Recognition Using Smartwatches' International Journal for Information Security Research 6, (3) , DOI Open access
(2016) 'MORI: An Innovative Mobile Applications Data Risk Assessment Model' Journal of Internet Technology and Secured Transaction 5, (3/4) , DOI Open access
(2016) 'A suspect-oriented intelligent and automated computer forensic analysis' DIGITAL INVESTIGATION 18, 65-76 , DOI Open access
(2016) 'Awareness of Mobile Device Security' International Journal of Mobile Computing and Multimedia Communications 7, (1) 15-31 , DOI
(2015) 'Continuous and transparent multimodal authentication: reviewing the state of the art' Cluster Computing 19, (1) 455-474 , DOI Open access
(2015) 'A forensic acquisition and analysis system for IaaS' Cluster Computing 19, (1) 439-453 , DOI Open access
(2015) 'A Fine-Grained Analysis of User Activity on Mobile Applications: The Sensitivity Level Perception' International Journal for Information Security Research 5, (3) 591-599 , DOI
(2015) 'Continuous user authentication using multi-modal biometrics' Computers & Security 53, 234-246 , DOI Open access
(2015) 'Language-independent gender identification through keystroke analysis' Information & Computer Security 23, (3) 286-301 , DOI
(2014) 'Android Forensic Data Analyzer (AFDA): An Opensource Tool to Automatize Event Correlation Analysis on Android Devices' International Journal for Information Security Research 4, (4) 501-509 , DOI
(2014) 'End-to-middle-to-end solution for IMS media plane security' Electronic Commerce Research , DOI Open access
(2013) 'A response selection model for intrusion response systems: Response Strategy Model (RSM)' Security and Communication Networks 7, (11) 1831-1848 , DOI
(2013) 'Active authentication for mobile devices utilising behaviour profiling' International Journal of Information Security 13, (3) 229-244 , DOI Open access
(2013) 'Human aspects of information security' Information Management & Computer Security 21, (1) 5-15 , DOI
(2013) 'Co-operative user identity verification using an Authentication Aura' COMPUTERS & SECURITY 39, 486-502 , DOI
(2012) 'An agent based business aware incident detection system for cloud environments' Journal of Cloud Computing: Advances, Systems and Applications 1, 9-9
(2012) 'Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers' SECURITY AND COMMUNICATION NETWORKS 5, (1) 3-14 , DOI
(2012) 'Power to the people? The evolving recognition of human aspects of security' Computers & Security
(2011) 'Special issue from the sixth international annual workshop on digital forensics and incident analysis' International Journal of Digital Crime and Forensics 3, (3)
(2011) 'Establishing A Personalized Information Security Culture' International Journal of Mobile Computing and Multimedia Communications (IJMCMC) 3, 63-79
(2011) 'Misuse detection for mobile devices using behaviour profiling' International Journal of Cyber Warfare and Terrorism (IJCWT) 1, 41-53
(2010) 'A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm' COMPUTERS & SECURITY 29, (6) 712-723 , DOI
(2009) 'A Friend Mechanism for Mobile Ad Hoc Networks' Journal of Information Assurance and Security 4, (4) 440-448
(2009) 'From desktop to mobile: Examining the security experience' COMPUTERS & SECURITY 28, (3-4) 130-137 , DOI
(2008) 'Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks' AD HOC NETWORKS 6, (7) 1151-1167 , DOI
(2007) 'The Application of Signature Recognition to Transparent Handwriting Verification for Mobile Devices' Information Management & Computer Security 15 (3), 214-225 , DOI
(2006) 'A Composite User Authentication Architecture for Mobile Devices' Journal of Information Warfare 5, (2) 11-29
(2005) 'Authentication of users on mobile telephones - A survey of attitudes and practices' COMPUTERS & SECURITY 24, (7) 519-527 , DOI
(2005) 'Biometrics - The promise versus the practice' Computer Fraud and Security September, 12-16
(2005) 'Biometrics: No silver bullets' Computer Fraud and Security August, 9-14
(2005) 'The role of academic qualifications in the IT security profession' DATAWATCH, Information Systems Audit and Control Association (ISACA) winter, 8-15
(2003) 'Keystroke Dynamics on a Mobile Handset: A Feasibility Study' Information Management & Computer Security 11 (4), 161-166 , DOI
'Beyond the PIN: Enhancing user authentication for mobile devices' Computer Fraud & Security 2008, (8) 12-17
'Comparing intentions to use university-provided vs vendor-provided multibiometric authentication in online exams' Campus-Wide Information Systems 28, (2) 102-113
Books
(2023) Human Aspects of Information Security and Assurance 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4–6, 2023, Proceedings. Springer Nature
(2022) Human Aspects of Information Security and Assurance 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6–8, 2022, Proceedings. Springer Nature
(2021) Human Aspects of Information Security and Assurance 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings. Springer
(2020) Human Aspects of Information Security and Assurance 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings. Springer
(2011) Transparent User Authentication. Springer Verlag
(2011) Transparent user authentication: biometrics, RFID and behavioural profiling [e-book].
(2010) Computer Forensics. It Governance Pub
Chapters
(2021) 'Delay-tolerant networks (DTNs) for deep-space communications' Advances in Delay-Tolerant Networks (DTNs) Elsevier 47-58 , DOI
(2021) 'Frictionless User Authentication' in Jajodia S; Samarati P; Yung M Encyclopedia of Cryptography, Security and Privacy Springer , DOI
(2020) 'Rule-Based Security Monitoring of Containerized Environments' Cloud Computing and Services Science
9th International Conference, CLOSER 2019, Heraklion, Crete, Greece, May 2–4, 2019, Revised Selected Papers Springer International Publishing 66-86 , DOI Open access
(2018) 'Biometric systems, modalities and attacks' in Awad AI; Fairhurst M Information Security Foundations, Technologies and Applications
(2015) '3 Delay-tolerant networks (DTNs) for deep-space communications' Advances in Delay-Tolerant Networks (DTNs) Elsevier 49-60 , DOI
(2014) 'Delay-tolerant networks (DTNs) for deep-space communications' in Rodrigues JJPC Advances in Delay-tolerant Networks (DTNs) Architecture and Enhanced Performance Elsevier
(2008) 'User Authentication Technologies' in Furnell S; Katsikas SK; Lopez J; Patel A Securing information and communications systems Artech House Publishers 35-59
Conference Papers
(2024) 'Pix2Pix Hyperparameter Optimisation Towards Ideal Universal Image Quality Index Score' Springer Nature Switzerland 862-882 , DOI
(2023) 'A Novel Metric for XAI Evaluation Incorporating Pixel Analysis and Distance Measurement' 2023 IEEE 35th International Conference on Tools with Artificial Intelligence (ICTAI) 1-/-1/20231-/-1/2023IEEE , DOI
(2023) 'A Unified Forensics Analysis Approach to Digital Investigation' Academic Conferences International Ltd 466-475 , DOI Open access
(2023) 'Verifiable Machine Learning Models in Industrial IoT via Blockchain' Springer Nature Switzerland 66-84 , DOI
(2022) 'The Need for Emergency-Based Access Control in AAL Systems' 2022 11th Mediterranean Conference on Embedded Computing (MECO) 6-/-0/20226-/-0/2022IEEE , DOI
(2022) 'Explainable AI with Domain Adapted FastCAM for Endoscopy Images' Springer International Publishing 57-64 , DOI
(2022) 'Surface Quality Augmentation for Metalworking Industry with Pix2Pix' Elsevier BV 897-906 , DOI Open access
(2019) 'Multi-Platform Authorship Verification' CECC 2019: Central European Cybersecurity Conference ACM , DOI
(2019) 'Information Security Risk Communication: A User-Centric Approach' 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA) 1-/-1/20191-/-1/2019IEEE , DOI
(2019) 'The Feasibility of Using Behavioural Profiling Technique for Mitigating Insider Threats: Review' 5th International Conference on Computer Science, Information Technology Aircc Publishing Corporation , DOI Open access
(2019) 'User Profiling Based on Application-Level Using Network Metadata' 2019 7th International Symposium on Digital Forensics and Security (ISDFS) 6-/-0/20196-/-0/2019IEEE , DOI Open access
(2019) 'Privacy Enhancing Data Access Control for Ambient Assisted Living' 9th International Conference on Cloud Computing and Services Science 5-/-0/20195-/-0/2019SCITEPRESS - Science and Technology Publications , DOI Open access
(2019) 'Rule-based Security Monitoring of Containerized Workloads' 9th International Conference on Cloud Computing and Services Science 5-/-0/20195-/-0/2019SCITEPRESS - Science and Technology Publications , DOI Open access
(2019) 'A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications' 5th International Conference on Information Systems Security and Privacy 2-/-0/20192-/-0/2019SCITEPRESS - Science and Technology Publications , DOI Open access
(2019) 'Identification and Extraction of Digital Forensic Evidence from Multimedia Data Sources using Multi-algorithmic Fusion' 5th International Conference on Information Systems Security and Privacy 2-/-0/20192-/-0/2019SCITEPRESS - Science and Technology Publications , DOI Open access
(2019) 'Physical Activity Recognition by Utilising Smartphone Sensor Signals' 8th International Conference on Pattern Recognition Applications and Methods 2-/-0/20192-/-0/2019SCITEPRESS - Science and Technology Publications , DOI Open access
(2019) 'Securing Cloud Storage by Transparent Biometric Cryptography' Springer International Publishing 97-108 , DOI
(2019) 'Fast predictive maintenance in Industrial Internet of Things (IIoT) with Deep Learning (DL): A review' 69-79 Open access
(2018) 'Evidence Identification in Heterogeneous Data Using Clustering' ARES 2018: International Conference on Availability, Reliability and Security ACM , DOI
(2018) 'Continuous user authentication using smartwatch motion sensor data' The 12th IFIP International Conference on Trust Management Toronto, Canada 7-/-0/20187-/-0/201815-28 , DOI Open access
(2018) 'A Holistic Framework for Enhancing Privacy Awareness' 2018 21st Saudi Computer Society National Computer Conference (NCC) 4-/-0/20184-/-0/2018IEEE , DOI
(2018) 'The Current Situation of Insider Threats Detection: An Investigative Review' 2018 21st Saudi Computer Society National Computer Conference (NCC) 4-/-0/20184-/-0/2018IEEE , DOI
(2018) 'Biometrically Linking Document Leakage to the Individuals Responsible' Springer International Publishing 135-149 , DOI
(2018) 'A comparison of compliance with data privacy requirements in two countries'
(2018) 'Misuse Detection in a Simulated IaaS Environment' Springer International Publishing 103-115 , DOI
(2018) 'A multi-algorithmic approach for gait recognition' 20-28
(2018) 'Advanced facial recognition for digital forensics' 11-19
(2018) 'Automating the harmonisation of heterogeneous data in digital forensics' 299-306
(2018) 'Continuous identity verification in cloud storage services using behavioural profiling' 1-10
(2017) 'A novel multimedia-forensic analysis tool (M-FAT)' 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20172-/-1/2017IEEE , DOI
(2017) 'An analysis of home user security awareness & education' 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20172-/-1/2017IEEE , DOI
(2017) 'Transparent authentication: Utilising heart rate for user authentication' 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20172-/-1/2017IEEE , DOI
(2017) 'Smart watch based body-temperature authentication' 2017 International Conference on Computing Networking and Informatics (ICCNI) 0-/-1/20170-/-1/2017IEEE , DOI
(2017) 'Insider Misuse Attribution using Biometrics' ARES '17: International Conference on Availability, Reliability and Security ACM , DOI
(2017) 'Information security behavior: Recognizing the influencers' 2017 Computing Conference 7-/-0/20177-/-0/2017IEEE , DOI
(2017) 'A forensic acquisition based upon a cluster analysis of non-volatile memory in IaaS' 2017 2nd International Conference on Anti-Cyber Crimes (ICACC) 3-/-0/20173-/-0/2017IEEE , DOI
(2017) 'Insider Misuse Identification using Transparent Biometrics' Hawaii International Conference on System Sciences Hawaii International Conference on System Sciences , DOI Open access
(2016) 'Activity Recognition using wearable computing' 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20162-/-1/2016IEEE , DOI Open access
(2016) 'Information security policies: A review of challenges and influencing factors' 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20162-/-1/2016IEEE , DOI
(2016) 'User profiling from network traffic via novel application-level interactions' 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20162-/-1/2016IEEE , DOI
(2016) 'INCREASING ELEARNING ENGAGEMENT USING MOBILE TECHNOLOGIES' International Technology, Education and Development Conference 1-/-1/20161-/-1/2016IATED , DOI
(2016) 'A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment' 2016 11th International Conference on Availability, Reliability and Security (ARES ) 8-/-0/20169-/-0/2016IEEE , DOI
(2016) 'THE VALUE OF THE BIOMETRICS IN INVIGILATED E-ASSESSMENTS' International Conference on Education and New Learning Technologies 7-/-0/20167-/-0/2016IATED , DOI
(2016) 'Proactive biometric-enabled forensic imprinting' 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security) 6-/-0/20166-/-0/2016IEEE , DOI
(2016) 'Software Defined Privacy' 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW) 4-/-0/20164-/-0/2016IEEE , DOI
(2016) 'A Scalable Architecture for Distributed OSGi in the Cloud' 6th International Conference on Cloud Computing and Services Science 4-/-0/20164-/-0/2016SCITEPRESS - Science and Technology Publications , DOI
(2016) 'Evidence Collection in Cloud Provider Chains' 6th International Conference on Cloud Computing and Services Science 4-/-0/20164-/-0/2016SCITEPRESS - Science and Technology Publications , DOI
(2016) 'Information Security and Practice: The User's Perspective' 81-89
(2016) 'Providing Security in Container-Based HPC Runtime Environments' Springer International Publishing 685-695 , DOI
(2015) 'Awareness, behaviour and culture: The ABC in cultivating security compliance' 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20152-/-1/2015IEEE , DOI
(2015) 'Transparent authentication systems for mobile device security: A review' 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20152-/-1/2015IEEE , DOI
(2015) 'Forensic Investigation of Network Traffic: A Study into the Derivation of Application-Level features from Network-Level Metadata' Annual International Conference on ICT: Big Data, Cloud and Security (ICT-BDCS 2015) Global Science and Technology Forum (GSTF) , DOI
(2015) 'Cloud Forensics: A Review of Challenges, Solutions and Open Problems' 2015 International Conference on Cloud Computing (ICCC) 4-/-0/20154-/-0/2015IEEE , DOI
(2015) 'The Current Use of Authentication Technologies: An Investigative Review' 2015 International Conference on Cloud Computing (ICCC) 4-/-0/20154-/-0/2015IEEE , DOI
(2015) 'A Survey of Continuous and Transparent Multibiometric Authentication Systems' 1-10
(2015) 'An Identification of Variables Influencing the Establishment of Information Security Culture' Springer International Publishing 436-448 , DOI
(2015) 'Behavioral-Based Feature Abstraction From Network Traffic' 1-9
(2015) 'E-INVIGILATION OF E-ASSESSMENTS' 1582-1591
(2015) 'Security, Privacy and Usability – A Survey of Users’ Perceptions and Attitudes' Springer International Publishing 153-168 , DOI
(2015) 'Towards dynamic adaption of user's organisational information security behaviour' 28-36 , DOI
(2014) 'Android forensics: Correlation analysis' 2014 9th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20142-/-1/2014IEEE , DOI
(2014) 'Performance evaluation of a Technology Independent Security Gateway for Next Generation Networks' 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) 0-/-1/20140-/-1/2014IEEE , DOI
(2014) 'Performance-driven evaluation for deploying IMS-based interoperability scenarios' ICC 2014 - 2014 IEEE International Conference on Communications 6-/-0/20146-/-0/2014IEEE , DOI
(2014) 'Cloud QoS Scaling by Fuzzy Logic' 2014 IEEE International Conference on Cloud Engineering (IC2E) 3-/-0/20143-/-0/2014IEEE , DOI
(2014) 'An Evaluation of Behavioural Profiling on Mobile Devices' Springer International Publishing 330-339 , DOI
(2014) 'Text-Based Active Authentication for Mobile Devices' Springer Berlin Heidelberg 99-112 , DOI
(2014) 'A conceptual model for federated authentication in the cloud' 1-11
(2014) 'A user-oriented network forensic analyser: The design of a high-level protocol analyser' 84-93 , DOI
(2014) 'Towards an automated forensic examiner (AFE) based upon criminal profiling & artificial intelligence' 1-9
(2013) 'Anomaly Detection in IaaS Clouds' 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom) 2-/-1/20132-/-1/2013IEEE , DOI
(2013) 'Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions' 2013 Information Security for South Africa 8-/-0/20138-/-0/2013IEEE , DOI
(2013) 'A TECHNOLOGY INDEPENDENT SECURITY GATEWAY FOR FUTURE EMERGENCY TELECOMMUNICATION SYSTEMS (ETS)' 299-308
(2013) 'A Technology Independent Security Gateway for Real-Time Multimedia Communication' Springer Berlin Heidelberg 14-25 , DOI
(2013) 'e-Invigilator: A Biometric-Based Supervision System for e-Assessments' 238-242
(2013) 'Preface'
(2013) 'USER REQUIREMENTS FOR FUTURE WIDEBAND CRITICAL COMMUNICATIONS' 341-348
(2012) 'A novel security architecture for a space-data DTN' Springer Berlin/Heidelberg 342-349
(2012) 'A Response Strategy Model for Intrusion Response Systems' Springer Boston 573-578
(2012) 'Multi-modal Behavioural Biometric Authentication for Mobile Devices' Springer Boston 465-474
(2012) 'Personal knowledge management beyond versioning' 28-28
(2012) 'Validating Cloud Infrastructure Changes by Cloud Audits' 377-384
(2012) 'A feasibility study into tracking Wi-Fi enabled mobile devices' 85-92
(2012) 'LEARNING MANAGEMENT SYSTEMS IN HIGHER EDUCATION: A STUDENT PERSPECTIVE' 4046-4055
(2012) 'Preface'
(2012) 'Web-based risk analysis for home users' 19-27
(2011) 'Personal knowledge management - Beyond versioning' 242-249
(2011) 'An autonomous agent based incident detection system for cloud environments' 197-204
(2011) 'Behaviour Profiling for Transparent Authentication for Mobile Devices' 307-314
(2011) 'Incident detection for cloud environments' 100-105
(2011) 'Risk assessment for mobile devices' Springer Berlin/Heidelberg 210-221
(2011) 'SMS linguistic profiling authentication on mobile device' 224-228
(2011) 'Preface'
(2010) 'An Analysis of Information Security Awareness within Home and Work Environments' 196-203 , DOI
(2010) 'An investigation and survey of response options for Intrusion Response Systems (IRSs)' 1-8
(2010) 'Assessing the Usability of End-User Security Software' 177-189
(2010) 'Preface'
(2010) 'Service Quality Assessment in Distance Learning' 269-277
(2009) 'Strong Authentication for web services using smartcards' 55-62
(2009) 'A CRITICAL EVALUATION OF OPAS (ONLINE PEER ASSESSMENT SYSTEM)' IATED 5124-5135
(2009) 'Assessing the Usability of Personal Internet Security Tools' 102-111
(2009) 'Flexible and Transparent User Authentication for Mobile Devices' 1-12
(2009) 'Intrusion Detection System for Mobile Devices: Investigation on Calling Activity'
(2009) 'Strong Authentication for Web Services using Smartcards' 8-8
(2009) 'Preface'
(2008) 'Deployment of keystroke analysis on a Smartphone' 29-39
(2008) 'Assessing the Challenges of Intrusion Detection Systems'
(2008) 'Deployment of keystroke analysis on a smartphone' 48-48
(2008) 'Investigating the problem of IDS false alarms: An experimental study using Snort' Springer 253-267
(2008) 'The problem of false alarms: Evaluation with Snort and DARPA 1999 dataset' 139-+
(2008) 'Preface'
(2007) 'Device-versus network-centric authentication paradigms for mobile devices: Operational and perceptual trade-offs' 117-126
(2007) 'Utilising biometrics for transparent user authentication on mobile devices' 549-557
(2007) 'Building a trusted community for mobile ad hoc networks using friend recommendation' 129-+
(2007) 'Device-versus Network-Centric Authentication Paradigms for Mobile Devices' School of Computer and Information Science, Edith Cowan University, Perth, Western Australia
(2007) 'Perceptions of user authentication on mobile devices' 11-13
(2007) 'Proceedings of the International Symposium on Human Aspects of Information Security and Assurance (HAISA 2007)' University of Plymouth, School Of Computing, Communications And Electronics
(2007) 'User Perception of the Security & Privacy Concerns of RFID Technology' Lulu. com 156-156
(2007) 'Preface'
(2006) 'A two-tier intrusion detection system for mobile ad hoc networks - A friend approach' 590-595
(2006) 'Part II-Short Papers-Infrastructure Protection and Cyber Security-A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks–A Friend Approach' Berlin: Springer-Verlag, 1973- 590-595
(2006) 'Transparent handwriting verification for mobile devices' 277-287
(2005) 'Organisational security culture: embedding security awareness, education and training' 67-74
(2004) 'Application of keystroke analysis to mobile text messaging' 14-15
(2003) 'Using keystroke analysis as a mechanism for subscriber authentication on mobile handsets' 97-108
(2003) 'Using keystroke analysis as a mechanism for subscriber authentication on mobile handsets' 97-108
(2002) 'Subscriber Authentication for Mobile Phones through the Implementation of Keystroke Dynamics' in Furnell S; Dowland PS University of Plymouth 347-355
(2002) 'Advanced subscriber authentication approaches for third generation mobile systems' 319-323
(2002) 'Biometric authentication for mobile devices' 61-69
(2002) 'Subscriber authentication for mobile phones using keystroke dynamics' 16-18
Patents
A CONTAINER AND SECURITY SYSTEMS.
Adjusting an operating mode of a security container in response to an unexpected received radio signal. GB2472632 (A)
Method of Associating a Person with a Digital Object. WO/2017/207998
Presentations and posters
'Facial-Forensic Analysis Tool' , DOI
Personal
Personal
Reports & invited lectures
- Invited Lecturer, “Human Aspects of Cyber Security”, IPICS Summer School, Lesvos, Greece, July 2023
- Invited Presentation, “Usable Authentication – the drive to a frictionless experience”, Security4U Research Group, University of South Africa, May 2023
- Invited Keynote, "Big Data - Challenges and Opportunities in Digital Forensics", 13th International Conference on Cloud Computing, Data Science and Engineering, January 2023
- Invited Presentation, "Tackling Big Data in Digital Forensics", University of Wolverhampton, October 2022
- Invited Presentation, "Advancing Digital Forensics through Artificial Intelligence", The Security Conference, Las Vegas, March 2021 (Online)
- Invited Keynote, "Frictionless Authentication: The Panacea to the Problem?", 7th International Conference on Computer Science and Information Technology, Khartoum, Sudan, Jan 2020
- Invited Presentation, "Maritime Cyber Threats", Marine and Maritime Cyber Security, Plymouth, November 2019
- Invited Panel, "Cyber Security Skills: Do we know what we need?", Secure South West 13, Plymouth, October 2019
- Invited Presentation, “Is Digital Forensics a Necessity for Organisations?”, University of Nevada (Reno), May 2019
- Invited Lecturer, “Introduction to Digital Forensics”, IPICS Summer School, Lesvos, Greece, July 2018
- Invited Presentation, “Cyber Security”, Romney Street Group, Athenaeum Club, London, 6th February 2018
- Invited Briefing, House of Lords - Science and Technology Committee on Digital Forensics, 30th January 2018
- Invited Panel, “Privacy, Encryption and Hacktivism: Is your Information Safe Online?”, Chatham House – The Royal Institute of International Affairs, London, UK, September 2017
- Invited Lecturer, “Introduction to Digital Forensics”, IPICS Summer School, Corfu, Greece, June 2017
- Invited Panel, “Insider Misuse”, The Security Conference, Las Vegas, April 2017
- Invited Presentation, “Usable Authentication”, City University, March 2017
- Invited Panel, “Cybercrime, Can we Keep Up?”, Plymouth University, February 2017
- Invited Lecturer, “Introduction to Cloud Security & Forensics”, IPICS Summer School, Ghent, Belgium, July 2016
- Invited Lecturer, “Introduction to Cloud Security & Forensics”, IPICS Summer School, Lesvos, Greece, July 2015
- Invited Presentation, “Transparent & Continuous Authentication”, De Montfort University, 11th March 2015
- Invited Presentations, “Digital Forensic Challenges & Research”, ESIEA – Sciences et Technologies du Numerique, Paris, 23rd February 2015
- Invited Presentation, “Continuous Authentication”, Princess Nora University, Saudi Arabia, 27th November 2014
- Invited Presentation, “Active Authentication: The Natural Evolution”, Biometrics 2014, London, 21st October 2014
- Invited Lecturer, Digital Forensics, IPICS Summer School, Lesvos, Greece, July 2014
- Invited Scholar, University of Fort Hare, South Africa, April 2014
- Invited Presentation, “The Role of Digital Forensics within Organisations”, Secure South West, Plymouth, December 2013
- Invited Presentation, "Information Security: Impacts and Consequences", Brunel University, London, November 2010
- Invited Presentation, “Security and Privacy”, Brunel University, London, UK, November 2009
- Invited Presentation, “The Future of Biometrics in E-Learning Systems”, Biometric Consortium Conference, Florida, USA, September 2009
- Invited Presentation, "Effective User Authentication for Mobile Devices", University of Nevada, London, July 2009
- Invited Presentation, "Applications Security", University of Tunis-Carthage, Tunis, Tunisia, March, 2009
- Invited Presentation, "Biometrics - No Silver Bullet", University of Portsmouth, Portsmouth, UK, January 2009
- Invited Lecturer, IPICS Summer School, Regensburg, Germany, July 2008
- Invited Presentation, "Flexible and Transparent User Authentication for Mobile Devices", Oviedo, Spain, May 2008
- Invited Presentation, "User Authentication for Mobile Devices", University of Portsmouth, Portsmouth, UK, March 2007
- Invited Presentation, "Biometric Authentication for Mobile Devices", Aston University, Birmingham, UK, February 2007
- Keynote Speech, The Art of Computing Technology 2006, "Biometrics: The Future of Personal Authentication", University of Technology Malaysia, March 2006
- Invited Lecturer/Scholar, University of Technology Malaysia, March/April 2006
- Keynote Speech, 11th Conference on Human Computer Interaction, "Biometrics: The Promise Versus the Practice", Oviedo, Spain, 22-24 March 2006
- Invited Lecturer/Scholar, Nelson Mandela Metropolitan University, August/September 2005
- Invited Lecturer, IPICS Summer School, Chios, Greece, July 2005
- Invited Lecturer, IPICS Winter School, Oulu, Finland, April 2005
Conferences organised
- Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2024), Skovde, Sweden, July 2024
- Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2023), Kent, UK, July 2023
- Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2022), Lesvos, Greece, July 2022
- Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2021), Online, July 2021
- Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2020), Online, July 2020
- Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2019), Nicosia, Cyprus, July 2019
- Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2018), Glasgow, Scotland, July 2018
- Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2017), Adelaide, Australia, November 2017
- Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2016), Frankfurt, Germany, July 2016
- Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2015), Lesvos, Greece, July 2015
- Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2014), Plymouth,UK, June 2014
- Co-Chair: Workshop in Digital Forensics & Incident Analysis (WDFIA 2014), Plymouth, UK, June 2014
- Chair: Emergency Telecommunication Systems (ETS 2013) special track, Wrexham, UK, September 2013
- Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2013), Lisbon, Portugal, May 2013
- Co-Chair: Workshop in Digital Forensics & Incident Analysis (WDFIA 2013), Lisbon, Portugal, May 2013
- Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2012), Crete, Greece, June 2012
- Co-Chair: Workshop in Digital Forensics & Incident Analysis (WDFIA 2012), Crete, Greece, June 2012
- Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2011), Kingston University, United Kingdom
- Co-Chair: Workshop in Digital Forensics & Incident Analysis (WDFIA 2011), Kingston University, United Kingdom
- Co-Chair: Workshop on Digital Forensics and Incident Analysis (WDFIA 2010), Port Elizabeth, South Africa, May 2010.
- Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2010), Port Elizabeth, South Africa, May 2010.
- Co-Chair: Workshop on Digital Forensics and Incident Analysis (WDFIA 2009), Athens, Greece, June 2009.
- Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2009), Athens, Greece, June 2009.
- Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2008), Plymouth, UK, July 2008.
- Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2007), Plymouth, UK, July 2007.
- Track Chair: Mobility & Security, 6th Security Conference, Las Vegas, USA, April 2007.
- Local organising committee: International Networking Conference (INC2006), Plymouth, UK, July 2006.
- Local organising committee: International Networking Conference (INC2004), Plymouth, UK, July 2004
Other academic activities
Journal Editorships/Reviewing:
Current Journal Editorships:
Current Journal Editorships:
- Editorial Board Member, Computers & Security, Elsevier
- Editorial Board Member, Journal of Information Security, Springer
- Editorial Board Member, International Journal of Cyber Warfare and Terrorism, IGI Global
- Sub Editor, South African Computer Journal, South African Institute of Computer Scientists and Information Technologists.
Previous Journal Editorships:
- Associate Editor, KIIS Transactions on Internet and Information Systems, KIIS
- Associate Editor, Security & Communication Networks, John Wiley
- Associate Editor, Communications and Computer Security, ACTA Press
- Editorial Board Member, Future Internet, MDPI Publishing.
- Editorial Board Member, Mobile Computing, World Academic Publishing
Guest Editor:
- Information & Computer Security, Vol. 31, No. 3, 2023
- Information & Computer Security, Vol. 29, No. 4, 2021
- Information & Computer Security, Vol. 26, No. 3, 2018
- Information & Computer Security, Vol. 24, No. 2, 2016
- Computers & Security (Special Section on Active Authentication), Vol. 39, Part B.
- Information Management & Computer Security, Vol. 21, No. 1, 2013
- International Journal of Digital Crime and Forensics, Vol. 4, No. 4, 2012
- International Journal of Digital Crime and Forensics, Vol. 3, No. 3, 2011
- Information Management & Computer Security, Vol. 18, No. 1, 2010
- Information Management & Computer Security, Vol. 18, No. 5, 2010
- Information Management & Computer Security, Vol. 17, No. 1, 2009
- Information Management & Computer Security, Vol. 15, No. 5, 2007
Journal Referee:
- Computer Standards and Interfaces, Elsevier
- Computers & Security, Elsevier
- EURASIP Journal on Advances in Signal Processing, Springer
- IEEE Communications Surveys and Tutorials
- IEEE Journal on Selected Areas in Communications Special Issue on Advances in Digital Forensics for Communications and Networking
- IEEE Transactions on Cybernetics, IEEE
- IEEE Transactions on Human-Machine Systems, IEEE
- IEEE Transactions on Information Forensics & Security, IEEE
- IET Information Security, IET
- IET Signal Processing, IET
- Information Security Journal: A Global Perspective
- Information Security Technical Report, Elsevier
- International Journal of Computer Science and Security, Computer Science Journals
- International Journal of Electronic Governance (IJEG), Inderscience
- International Journal of Information Technologies and Systems Approach, IGI Global
- International Journal of Interdisciplinary Telecommunications & Networking, IGI Global.
- International Journal of Pattern Recognition and Artificial Intelligence, World Scientific.
- Internet Research, Emerald
- Journal for Information Warfare
- Information Sciences, Elsevier
- Journal of Internet Services and Applications, Springer.
- Journal of Mobile Networks & Applications, Springer
- Journal of Network and Computer Applications, Elsevier
- Journal of Systems and Software, Elsevier Referee,
- Journal on Personal and Ubiquitous Computing: Special Issue: Security and Trust in Context-Aware Systems, Springer
- KSII Transactions on Internet and Information Systems
- Recent Patents in Computer Science, Bentham Science
- Security & Communication Networks, John Wiley & Sons
- The Computer Journal, Oxford Journals
Links
The Centre's research website can be located at: www.cscan.org